JohnTheRipperVboxLFS84

Running Security Test on LFS 8.4 Vbox

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1908043-HV-JOHNTHERI96
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
JTRVBOXLFS
August 04 2019
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


JohnTheRipperVboxLFS84OpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 3 2200G (4 Cores)Oracle VirtualBox v1.22048MB69GB VBOX HDDLinux From Scratch 8.44.20.12 (x86_64)GCC 8.2.0ext4VirtualBoxProcessorMotherboardMemoryDiskOSKernelCompilerFile-SystemSystem LayerJohnTheRipperVboxLFS84 BenchmarksSystem Logs- --disable-bootstrap --disable-libmpx --disable-multilib --enable-languages=c,c++ - l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishJTRVBOXLFS9001800270036004500SE +/- 69.23, N = 1539771. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5JTRVBOXLFS40K80K120K160K200KSE +/- 842.50, N = 31804141. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2